03-09-2009, 05:01 PM
This analysis the security threats in the World Wide Web and the excellent solutions available in the industry.
As you know that there's at least one person out there gunning for your system. Lurking behind the phosphors, waiting for just the right moment to pounce on your system and wreak havoc! What can a person do? Basically there are two approaches, proactive and reactive.
Proactive means that you're doing something before anything goes wrong, hoping to stop things before they escalate; reactive, on the other hand, means that you're going to go along just like everything is fine, and not do anything unless something is done to you. So which one is best? Probably a little bit of both; no system is really ever secure (unless it isn't connected to the Internet), but you can take a few simple steps to ensure that you aren't an easy target, and also be prepared and know what to do in case something does happen. In this aspect the research will be focussing on technologies like Personal Firewalls, Anti-Hacker Tools, Privacy Tools, Encryption Tools, Password manager and Anti Virus tools.
In person-to-person transactions, security is based on physical cues. Consumers have come to accept the risks of using credit cards in places like department stores because they can see and touch the merchandise and make judgments about the store. On the Internet, without those physical cues, it is much more difficult to assess the safety of a business. Also, serious security threats have emerged. By becoming aware of the risks of Internet-based transactions, businesses can acquire technology solutions that overcome those risks like Spoofing, Unauthorized action, Unauthorized disclosure, Data alteration etc. Here the research will be focusing on technologies like SSL(Secure Socket Layers), Server Ids, Private key and Public Key infrastructure, Encryption algorithms like RSA algorithm etc